docs: Fix issues found by codespell (#2896)
Signed-off-by: Mario Trangoni <mjtrangoni@gmail.com> Co-authored-by: Felix Kunde <felix-kunde@gmx.de>
This commit is contained in:
parent
ccb52c094d
commit
51135b07db
|
|
@ -384,7 +384,7 @@ exceptions:
|
||||||
The interval of days can be set with `password_rotation_interval` (default
|
The interval of days can be set with `password_rotation_interval` (default
|
||||||
`90` = 90 days, minimum 1). On each rotation the user name and password values
|
`90` = 90 days, minimum 1). On each rotation the user name and password values
|
||||||
are replaced in the K8s secret. They belong to a newly created user named after
|
are replaced in the K8s secret. They belong to a newly created user named after
|
||||||
the original role plus rotation date in YYMMDD format. All priviliges are
|
the original role plus rotation date in YYMMDD format. All privileges are
|
||||||
inherited meaning that migration scripts should still grant and revoke rights
|
inherited meaning that migration scripts should still grant and revoke rights
|
||||||
against the original role. The timestamp of the next rotation (in RFC 3339
|
against the original role. The timestamp of the next rotation (in RFC 3339
|
||||||
format, UTC timezone) is written to the secret as well. Note, if the rotation
|
format, UTC timezone) is written to the secret as well. Note, if the rotation
|
||||||
|
|
@ -564,7 +564,7 @@ manifest affinity.
|
||||||
```
|
```
|
||||||
|
|
||||||
If `node_readiness_label_merge` is set to `"OR"` (default) the readiness label
|
If `node_readiness_label_merge` is set to `"OR"` (default) the readiness label
|
||||||
affinty will be appended with its own expressions block:
|
affinity will be appended with its own expressions block:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
affinity:
|
affinity:
|
||||||
|
|
@ -1140,7 +1140,7 @@ metadata:
|
||||||
iam.gke.io/gcp-service-account: <GCP_SERVICE_ACCOUNT_NAME>@<GCP_PROJECT_ID>.iam.gserviceaccount.com
|
iam.gke.io/gcp-service-account: <GCP_SERVICE_ACCOUNT_NAME>@<GCP_PROJECT_ID>.iam.gserviceaccount.com
|
||||||
```
|
```
|
||||||
|
|
||||||
2. Specify the new custom service account in your [operator paramaters](./reference/operator_parameters.md)
|
2. Specify the new custom service account in your [operator parameters](./reference/operator_parameters.md)
|
||||||
|
|
||||||
If using manual deployment or kustomize, this is done by setting
|
If using manual deployment or kustomize, this is done by setting
|
||||||
`pod_service_account_name` in your configuration file specified in the
|
`pod_service_account_name` in your configuration file specified in the
|
||||||
|
|
|
||||||
|
|
@ -247,7 +247,7 @@ These parameters are grouped directly under the `spec` key in the manifest.
|
||||||
[kubernetes volumeSource](https://godoc.org/k8s.io/api/core/v1#VolumeSource).
|
[kubernetes volumeSource](https://godoc.org/k8s.io/api/core/v1#VolumeSource).
|
||||||
It allows you to mount existing PersistentVolumeClaims, ConfigMaps and Secrets inside the StatefulSet.
|
It allows you to mount existing PersistentVolumeClaims, ConfigMaps and Secrets inside the StatefulSet.
|
||||||
Also an `emptyDir` volume can be shared between initContainer and statefulSet.
|
Also an `emptyDir` volume can be shared between initContainer and statefulSet.
|
||||||
Additionaly, you can provide a `SubPath` for volume mount (a file in a configMap source volume, for example).
|
Additionally, you can provide a `SubPath` for volume mount (a file in a configMap source volume, for example).
|
||||||
Set `isSubPathExpr` to true if you want to include [API environment variables](https://kubernetes.io/docs/concepts/storage/volumes/#using-subpath-expanded-environment).
|
Set `isSubPathExpr` to true if you want to include [API environment variables](https://kubernetes.io/docs/concepts/storage/volumes/#using-subpath-expanded-environment).
|
||||||
You can also specify in which container the additional Volumes will be mounted with the `targetContainers` array option.
|
You can also specify in which container the additional Volumes will be mounted with the `targetContainers` array option.
|
||||||
If `targetContainers` is empty, additional volumes will be mounted only in the `postgres` container.
|
If `targetContainers` is empty, additional volumes will be mounted only in the `postgres` container.
|
||||||
|
|
@ -257,7 +257,7 @@ These parameters are grouped directly under the `spec` key in the manifest.
|
||||||
## Prepared Databases
|
## Prepared Databases
|
||||||
|
|
||||||
The operator can create databases with default owner, reader and writer roles
|
The operator can create databases with default owner, reader and writer roles
|
||||||
without the need to specifiy them under `users` or `databases` sections. Those
|
without the need to specify them under `users` or `databases` sections. Those
|
||||||
parameters are grouped under the `preparedDatabases` top-level key. For more
|
parameters are grouped under the `preparedDatabases` top-level key. For more
|
||||||
information, see [user docs](../user.md#prepared-databases-with-roles-and-default-privileges).
|
information, see [user docs](../user.md#prepared-databases-with-roles-and-default-privileges).
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -209,7 +209,7 @@ under the `users` key.
|
||||||
For all `LOGIN` roles that are not database owners the operator can rotate
|
For all `LOGIN` roles that are not database owners the operator can rotate
|
||||||
credentials in the corresponding K8s secrets by replacing the username and
|
credentials in the corresponding K8s secrets by replacing the username and
|
||||||
password. This means, new users will be added on each rotation inheriting
|
password. This means, new users will be added on each rotation inheriting
|
||||||
all priviliges from the original roles. The rotation date (in YYMMDD format)
|
all privileges from the original roles. The rotation date (in YYMMDD format)
|
||||||
is appended to the names of the new user. The timestamp of the next rotation
|
is appended to the names of the new user. The timestamp of the next rotation
|
||||||
is written to the secret. The default is `false`.
|
is written to the secret. The default is `false`.
|
||||||
|
|
||||||
|
|
@ -552,7 +552,7 @@ configuration they are grouped under the `kubernetes` key.
|
||||||
pods with `InitialDelaySeconds: 6`, `PeriodSeconds: 10`, `TimeoutSeconds: 5`,
|
pods with `InitialDelaySeconds: 6`, `PeriodSeconds: 10`, `TimeoutSeconds: 5`,
|
||||||
`SuccessThreshold: 1` and `FailureThreshold: 3`. When enabling readiness
|
`SuccessThreshold: 1` and `FailureThreshold: 3`. When enabling readiness
|
||||||
probes it is recommended to switch the `pod_management_policy` to `parallel`
|
probes it is recommended to switch the `pod_management_policy` to `parallel`
|
||||||
to avoid unneccesary waiting times in case of multiple instances failing.
|
to avoid unnecessary waiting times in case of multiple instances failing.
|
||||||
The default is `false`.
|
The default is `false`.
|
||||||
|
|
||||||
* **storage_resize_mode**
|
* **storage_resize_mode**
|
||||||
|
|
@ -701,7 +701,7 @@ In the CRD-based configuration they are grouped under the `load_balancer` key.
|
||||||
replaced by the cluster name, `{namespace}` is replaced with the namespace
|
replaced by the cluster name, `{namespace}` is replaced with the namespace
|
||||||
and `{hostedzone}` is replaced with the hosted zone (the value of the
|
and `{hostedzone}` is replaced with the hosted zone (the value of the
|
||||||
`db_hosted_zone` parameter). The `{team}` placeholder can still be used,
|
`db_hosted_zone` parameter). The `{team}` placeholder can still be used,
|
||||||
although it is not recommened because the team of a cluster can change.
|
although it is not recommended because the team of a cluster can change.
|
||||||
If the cluster name starts with the `teamId` it will also be part of the
|
If the cluster name starts with the `teamId` it will also be part of the
|
||||||
DNS, aynway. No other placeholders are allowed!
|
DNS, aynway. No other placeholders are allowed!
|
||||||
|
|
||||||
|
|
@ -720,7 +720,7 @@ In the CRD-based configuration they are grouped under the `load_balancer` key.
|
||||||
is replaced by the cluster name, `{namespace}` is replaced with the
|
is replaced by the cluster name, `{namespace}` is replaced with the
|
||||||
namespace and `{hostedzone}` is replaced with the hosted zone (the value of
|
namespace and `{hostedzone}` is replaced with the hosted zone (the value of
|
||||||
the `db_hosted_zone` parameter). The `{team}` placeholder can still be used,
|
the `db_hosted_zone` parameter). The `{team}` placeholder can still be used,
|
||||||
although it is not recommened because the team of a cluster can change.
|
although it is not recommended because the team of a cluster can change.
|
||||||
If the cluster name starts with the `teamId` it will also be part of the
|
If the cluster name starts with the `teamId` it will also be part of the
|
||||||
DNS, aynway. No other placeholders are allowed!
|
DNS, aynway. No other placeholders are allowed!
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -900,7 +900,7 @@ the PostgreSQL version between source and target cluster has to be the same.
|
||||||
|
|
||||||
To start a cluster as standby, add the following `standby` section in the YAML
|
To start a cluster as standby, add the following `standby` section in the YAML
|
||||||
file. You can stream changes from archived WAL files (AWS S3 or Google Cloud
|
file. You can stream changes from archived WAL files (AWS S3 or Google Cloud
|
||||||
Storage) or from a remote primary. Only one option can be specfied in the
|
Storage) or from a remote primary. Only one option can be specified in the
|
||||||
manifest:
|
manifest:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
|
|
@ -911,7 +911,7 @@ spec:
|
||||||
|
|
||||||
For GCS, you have to define STANDBY_GOOGLE_APPLICATION_CREDENTIALS as a
|
For GCS, you have to define STANDBY_GOOGLE_APPLICATION_CREDENTIALS as a
|
||||||
[custom pod environment variable](administrator.md#custom-pod-environment-variables).
|
[custom pod environment variable](administrator.md#custom-pod-environment-variables).
|
||||||
It is not set from the config to allow for overridding.
|
It is not set from the config to allow for overriding.
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
spec:
|
spec:
|
||||||
|
|
@ -1282,7 +1282,7 @@ minutes if the certificates have changed and reloads postgres accordingly.
|
||||||
### TLS certificates for connection pooler
|
### TLS certificates for connection pooler
|
||||||
|
|
||||||
By default, the pgBouncer image generates its own TLS certificate like Spilo.
|
By default, the pgBouncer image generates its own TLS certificate like Spilo.
|
||||||
When the `tls` section is specfied in the manifest it will be used for the
|
When the `tls` section is specified in the manifest it will be used for the
|
||||||
connection pooler pod(s) as well. The security context options are hard coded
|
connection pooler pod(s) as well. The security context options are hard coded
|
||||||
to `runAsUser: 100` and `runAsGroup: 101`. The `fsGroup` will be the same
|
to `runAsUser: 100` and `runAsGroup: 101`. The `fsGroup` will be the same
|
||||||
like for Spilo.
|
like for Spilo.
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue